10-09-2020 06:19 AM
Just checking with the community.
Let's say you have an environment where all traffic external traffic is checked at the Firewall.
Example:
ip route 10.10.10.115 255.255.255.248 1.1.1.1 and
ip route 10.10.10.30 255.255.255.248 1.1.1.1
as opposed to
ip route 10.10.10.0 255.255.255.0 1.1.1.1
Would you still prefer to enter specific route statements as opposed to using a CIDR to cover everything in addition to IPs that are not allowed at the Firewall? As the network grows you would have much more routes compared to less routes entered on your devices so what are you thoughts from that standpoint?
Solved! Go to Solution.
10-09-2020 06:52 AM
Hello,
are the 10.10.10.x networks external or internal networks ? What is the destination,1.1.1.1 ? Is that an external or internal destination ? In general, for external routing, the firewall would need only a default route.
ip route 0.0.0.0 0.0.0.0 1.1.1.1
10-09-2020 07:30 AM
Hello
Longer-prefixes are always most preffered, A router will always choose a more specifc route, if their a multple routes with the same length then admistrative distance of the routing protocol or static route comes into play.
10-09-2020 10:41 AM
I am sure that there are aspects of this question that I do not understand fully. But it seems to me that the question is asking about 2 aspects of configuring and managing firewalls (and perhaps other network equipment). One aspect is configuring and administering the firewall. From this perspective summarization/CIDR makes it easier and so might be preferred. The other aspect is security on the firewall. From this perspective more granular control (more entries with more specific masks) is better. These perspectives might be mutually exclusive (easy to have one, difficult to have both). Both perspectives are valid, but probably one is more important to the organization than the other. Which one is most important in your organization?
If I have misunderstood something please provide clarification.
10-13-2020 07:23 AM
What I was trying to say in my response is that neither approach is inherently better than the other. It is a choice to be made organization by organization depending on the local criteria. Your choice of summarization sounds appropriate for your situation. Thanks for marking this question as solved.
10-09-2020 06:52 AM
Hello,
are the 10.10.10.x networks external or internal networks ? What is the destination,1.1.1.1 ? Is that an external or internal destination ? In general, for external routing, the firewall would need only a default route.
ip route 0.0.0.0 0.0.0.0 1.1.1.1
10-09-2020 06:55 AM
No all IPs are external.
10-09-2020 07:23 AM
Hello,
the default route should be sufficient then. It is what you typically see on firewalls.
10-09-2020 07:30 AM
Hello
Longer-prefixes are always most preffered, A router will always choose a more specifc route, if their a multple routes with the same length then admistrative distance of the routing protocol or static route comes into play.
10-09-2020 07:55 AM
Yes but what about from a management/admin and security standpoint.
Let's say you have a bunch of single host IP destinations that don't all fall in the same subnets. You would have a lot of statements to add as opposed to just adding one large subnet statement which would allow all those IPs but then many more which is not needed, however yes they are blocked the the FW so still would not pass through the Firewall anyway.
10-09-2020 10:41 AM
I am sure that there are aspects of this question that I do not understand fully. But it seems to me that the question is asking about 2 aspects of configuring and managing firewalls (and perhaps other network equipment). One aspect is configuring and administering the firewall. From this perspective summarization/CIDR makes it easier and so might be preferred. The other aspect is security on the firewall. From this perspective more granular control (more entries with more specific masks) is better. These perspectives might be mutually exclusive (easy to have one, difficult to have both). Both perspectives are valid, but probably one is more important to the organization than the other. Which one is most important in your organization?
If I have misunderstood something please provide clarification.
10-13-2020 06:52 AM
Yes that was what I was thinking. Well lets just say basically the decision is solely on me. I may just go with summarization since subnets are checked at the Firewall.
10-13-2020 07:23 AM
What I was trying to say in my response is that neither approach is inherently better than the other. It is a choice to be made organization by organization depending on the local criteria. Your choice of summarization sounds appropriate for your situation. Thanks for marking this question as solved.
11-02-2020 05:34 AM
Thanks again Richard and Cisco Gurus!
11-02-2020 05:34 AM
Thanks again Paul and Cisco Gurus!
11-02-2020 07:22 AM
You asked an interesting (and significant) question and have received multiple responses, each representing a different perspective. As we said there is not any single "one size fits all" right answer. There are multiple perspectives to consider and the best choice will depend on the particular organization for which the question is asked. Thank you for marking the question as solved.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: